Article # |
Article Title & Authors (Volume 5 Issue 2 March 2016) |
Page |
1. |
Text extraction technique applied to plagiarism detection: The semantic analysis of statements for analyzing the writing style
Joshi O D, Pudale A H, Ghorpade R D
Abstract | PDF |
52-55 |
2. |
A Review on Data Leakage Prevention using Image Steganography
Mamta Jain, Saroj Kumar Lenka
Abstract | PDF |
56-59 |
3. |
An Apparatus And An Efficient Method For Converting Any Plane Surface Into Virtual Interactive Writing Board (SV WRITING BOARD) Using IR Sensing
Srishti Tiwari, Vidushi Vashishtha
Abstract | PDF |
60-67 |
4. |
A REVIEW OF SYMMETRIC KEY AND ASYMMETRIC KEY ENCRYPTION
ALGORITHMS
Deepika Rani Bansal, Preeti Thakur
Abstract | PDF |
68-70 |
5. |
Document Summarization Techniques
Simran kaur, wg.cdr anil chopra
Abstract | PDF |
71-77 |
6. |
SlashiT An Android Application for Expense Management using Hash-maps
Nishan Saraf, Uttam Somani,Deepa V. Jose,Karthik Krishnamurthi
Abstract | PDF |
78-81 |
7. |
Schema Architecture for Context Information
Y.K.Sundara Krishna, Ch.Suresh Babu
Abstract | PDF |
82-84 |
8. |
Improved Delegation Of Computation Using Somewhat Homomorphic Encryption To Reduce Storage Space
Dhivya.S, Venkatachalam.G
Abstract | PDF |
85-92 |
9. |
A New Algorithm for Solving Job Shop Sequencing Problem
Srikant Gupta, Irfan Ali, A. Ahmed
Abstract | PDF |
93-100 |
10. |
Personalized Image Search for Photo Sharing Website
Rajni Pamnani, Manan Desai, Varshish Bhanushali, Ashish Charla, Mayur Thakkar
Abstract | PDF |
101-106 |
11. |
Accuracy Estimation for Real World Sensor Application Using Inference and Learning Algorithm
R.C.Subashini, D. SelvaPandian
Abstract | PDF |
107-114 |
12. |
Faulty Link Detection in Wireless Sensor Network: A Survey
Anjila Deheriya, Kailash Patidar, Megha Jain
Abstract | PDF |
115-119 |
Use Adobe Acrobat 6.0 or more to view the PDF files. |
|